Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.2.11 vulnerabilities and exploits
(subscribe to this query)
6.9
CVSSv2
CVE-2021-3573
A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blackl...
Linux Linux Kernel 5.13
Linux Linux Kernel
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux 8.0
Fedoraproject Fedora 34
6.4
CVSSv2
CVE-2005-0815
Multiple "range checking flaws" in the ISO9660 filesystem handler in Linux 2.6.11 and previous versions may allow malicious users to cause a denial of service or corrupt memory via a crafted filesystem.
Linux Linux Kernel 2.0.12
Linux Linux Kernel 2.0.13
Linux Linux Kernel 2.0.20
Linux Linux Kernel 2.0.21
Linux Linux Kernel 2.0.28
Linux Linux Kernel 2.0.29
Linux Linux Kernel 2.0.35
Linux Linux Kernel 2.0.36
Linux Linux Kernel 2.0.8
Linux Linux Kernel 2.0.9
Linux Linux Kernel 2.2.11
Linux Linux Kernel 2.2.12
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.17
Linux Linux Kernel 2.2.24
Linux Linux Kernel 2.2.25
Linux Linux Kernel 2.2.8
Linux Linux Kernel 2.2.9
Linux Linux Kernel 2.3.99
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.11
1 EDB exploit
6.2
CVSSv2
CVE-2005-0178
Race condition in the setsid function in Linux prior to 2.6.8.1 allows local users to cause a denial of service (crash) and possibly access portions of kernel memory, related to TTY changes, locking, and semaphores.
Vserver Linux-vserver 1.24
Vserver Linux-vserver 1.21
Netkit Linux Netkit 0.17
Vserver Linux-vserver 1.22
Vserver Linux-vserver 1.20
Vserver Linux-vserver 1.23
Netkit Linux Netkit 0.17.17
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.0.30
Linux Linux Kernel 2.0.18
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.30
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.0.20
Linux Linux Kernel 2.5.29
Linux Linux Kernel 2.0.23
Linux Linux Kernel 2.0.9.9
Linux Linux Kernel 2.5.54
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.5.68
Linux Linux Kernel 2.5.3
5
CVSSv2
CVE-2015-3193
The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 prior to 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote malicious users to obt...
Openssl Openssl 1.0.2a
Openssl Openssl 1.0.2b
Openssl Openssl 1.0.2c
Openssl Openssl 1.0.2
Openssl Openssl 1.0.2d
Nodejs Node.js
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
1 Github repository
5
CVSSv2
CVE-2015-1794
The ssl3_get_key_exchange function in ssl/s3_clnt.c in OpenSSL 1.0.2 prior to 1.0.2e allows remote servers to cause a denial of service (segmentation fault) via a zero p value in an anonymous Diffie-Hellman (DH) ServerKeyExchange message.
Openssl Openssl 1.0.2a
Openssl Openssl 1.0.2b
Openssl Openssl 1.0.2c
Openssl Openssl 1.0.2
Openssl Openssl 1.0.2d
1 Article
4.6
CVSSv2
CVE-2022-0330
A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.
Linux Linux Kernel
Linux Linux Kernel 5.17
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux For Scientific Computing 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux For Power Little Endian 7.0
Redhat Enterprise Linux For Real Time 7
Redhat Enterprise Linux For Real Time For Nfv 7
Redhat Enterprise Linux For Power Big Endian 7.0
Redhat Enterprise Linux Server Aus 7.3
Redhat Enterprise Linux Server Aus 7.4
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux Server Aus 7.7
Redhat Enterprise Linux Server Tus 7.7
Redhat Enterprise Linux Eus 8.2
Redhat Enterprise Linux Server Tus 8.2
Redhat Enterprise Linux Server Aus 8.2
Redhat Enterprise Linux For Real Time 8
Redhat Enterprise Linux Server Tus 8.4
Redhat Enterprise Linux Eus 8.4
4.6
CVSSv2
CVE-2005-0504
Buffer overflow in the MoxaDriverIoctl function for the moxa serial driver (moxa.c) in Linux 2.2.x, 2.4.x, and 2.6.x prior to 2.6.22 allows local users to execute arbitrary code via a certain modified length value.
Linux Linux Kernel 2.2.11
Linux Linux Kernel 2.2.12
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.17
Linux Linux Kernel 2.2.18
Linux Linux Kernel 2.2.24
Linux Linux Kernel 2.2.25
Linux Linux Kernel 2.2.9
Linux Linux Kernel 2.3.0
Linux Linux Kernel 2.3.99
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.15
Linux Linux Kernel 2.2.20
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.2.5
Linux Linux Kernel 2.2.6
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
4.6
CVSSv2
CVE-2004-0685
Certain USB drivers in the Linux 2.4 kernel use the copy_to_user function on uninitialized structures, which could allow local users to obtain sensitive information by reading memory that was not cleared from previous usage.
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.15
Linux Linux Kernel 2.2.20
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.2.5
Linux Linux Kernel 2.2.6
Linux Linux Kernel 2.3.99
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.2.1
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.15 Pre20
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.22
Linux Linux Kernel 2.2.23
Linux Linux Kernel 2.2.7
Linux Linux Kernel 2.2.8
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.23
2.1
CVSSv2
CVE-2021-3564
A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system. This flaw affects all the Linux kernel versions starting from 3....
Linux Linux Kernel
Fedoraproject Fedora 34
Debian Debian Linux 9.0
2.1
CVSSv2
CVE-2002-1976
ifconfig, when used on the Linux kernel 2.2 and later, does not report when the network interface is in promiscuous mode if it was put in promiscuous mode using PACKET_MR_PROMISC, which could allow malicious users to sniff the network without detection, as demonstrated using libp...
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.2.14
Linux Linux Kernel 2.2.15
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.17
Linux Linux Kernel 2.3.99
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.3
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.12
Linux Linux Kernel 2.2.19
Linux Linux Kernel 2.2.20
Linux Linux Kernel 2.2.7
Linux Linux Kernel 2.2.9
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.4
Linux Linux Kernel 2.4.6
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »